A fundamental issue with machine learning is that the training data must contain sufficient examples of every data pattern of interest for the essentially statistical techniques of machine learning to derive a model t...
详细信息
Appropriate selection of search operators plays a critical role in meta-heuristic algorithm design. Adaptive selection of suitable operators to the characteristics of different optimization stages is an important task...
详细信息
This paper studies the fixed-time consensus tracking problem of nonlinear multi-agent systems, where communication links are subjected to denial-of-service (DoS) attacks. The DoS attacks make the communication network...
详细信息
Spatial transcriptomics (ST) offers insights into gene expression patterns within tumor microenvironments, but its widespread application is impeded by cost constraints. To address this, predicting ST from Histology e...
详细信息
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities a...
详细信息
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities at a single granularity (i.e., slice-level or function-level). In practice, slice-level vulnerability detection is fine-grained but may contain incomplete vulnerability details. Function-level vulnerability detection includes full vulnerability semantics but may contain vulnerability-unrelated statements. Meanwhile, they pay more attention to predicting whether the source code is vulnerable and cannot pinpoint which statements are more likely to be vulnerable. In this paper, we design mVulPreter, a multi-granularity vulnerability detector that can provide interpretations of detection results. Specifically, we propose a novel technique to effectively blend the advantages of function-level and slice-level vulnerability detection models and output the detection results' interpretation only by the model itself. We evaluate mVulPreter on a dataset containing 5,310 vulnerable functions and 7,601 non-vulnerable functions. The experimental results indicate that mVulPreter outperforms existing state-of-the-art vulnerability detection approaches (i.e., Checkmarx, FlawFinder, RATS, TokenCNN, StatementLSTM, SySeVR, and Devign). IEEE
The concept of iris segmentation was created to increase the accuracy of iris recognition. Past recognition methods used the entire eye image directly for recognition classification, which led to poor recognition resu...
详细信息
Wireless sensor networks have great potential for use in flood control, weather forecasting systems, the military, and the healthcare industry. A WSN's nodes are connected to one another and share information. Whe...
详细信息
The precise prediction of preoperative recurrence in non-small cell lung cancer (NSCLC) that is suitable for clinical application is still an open question. Recent advancements integrating genomic data with deep learn...
详细信息
Mobile prices play a pivotal role in determining their popularity amongst consumers and their competitive standing within the market. As customers consider their budget while evaluating a mobile phone's specificat...
详细信息
The diagnosis of a range of eye disorders needs to categorize the retinal vessels. computerized implementation of this process is becoming increasingly essential for automated screening systems for retinal diseases. T...
详细信息
暂无评论